Types of Malware

Defining Cybersecurity

Cybersecurity: While Traveling

Why ej4 for Cybersecurity Training Videos?

Training your employees on cybersecurity is critical in this age of online everything. All employees access various online systems and applications to handle their daily tasks. Customer service, order entry, inventory management, accounting, payroll and content management systems, just to name a few.

In addition, employees may surf the web for personal use, exposing their work computer to additional risks. If they click on a phishing email link from their personal email, they may be exposed to malware risks and identity theft.

You can sample our cybersecurity videos above, or sign up for a free trial and get full access to Thinkzoom, our learning management system. See for yourself how easy it is to access our training from anywhere, anytime. As you sample the courses you can access our student materials, enroll nine additional users and even record your own video with our award-winning authoring tool.

Preview our Cybersecurity Training Courses

Defining Cybersecurity

It's hard to have a conversation about cybersecurity without throwing around a lot of jargon, so in this training course, we're going to break down some common cybersecurity terms. We'll define cyberspace, cybersecurity, cybercrime, and cyberterrorism. We'll also go over other familiar terms including malware, phishing attacks and emails, and identity theft.

Passwords

No matter how many times we're told to create strong passwords, or to use different passwords on every site, we just don't do it. It's not convenient. We know the risk, but we think "it won't happen to us." But the minute your information is compromised, and you're on the phone with your bank trying to determine when and how your identity was stolen, and how long it'll take to get access to your money, you'll regret being lazy about passwords. The Federal Trade Commission (FTC) estimates that recovering from identity theft takes an average of 6 months and 200 hours of work. In this cybersecurity training program, we're going to go over a system that helps you set unique passwords for each site. We'll also discuss some additional tips for making your passwords more creative.

Types of Malware

Certain types of malware can impact your computer in different ways, but in the end, the impact is usually expensive, time-consuming, and frustrating. In order to help prevent a cyberattack, it's good to have an understanding of what's out there and how they get into your system. This course will walk viewers through the many types of malware including adware, bots, ransomware, rootkits, spyware, Trojan malware, computer viruses, and worms. We'll also discuss the warning signs that indicate a malware infection.

Cybersecurity: While Traveling

The goal of cybersecurity is to protect your devices and data. How does that work when you're traveling? What are the precautions that you need to take to keep your information safe? What happens if one of your devices gets stolen? What about unsecure Wi-Fi networks? What do you need to be aware of when using public networks? We'll answer these questions and more. We'll also discuss what you should do before you travel, while you're away, and what to do once you're back home.